Diseño De Gestión De Seguridad De La Información En Base A La Norma ISO 27002 Y Al Estudio De Situación Actual De La Empresa Proveedora De Internet “Posorja En Acción CIA. LTDA.”
Cargando...
Fecha
2017-12-11
Título de la revista
ISSN de la revista
Título del volumen
Editor
Universidad De Guayaquil.Facultad De Ciencias Matemáticas Y Físicas.Carrera De Ingeniería En Sistemas Computacionales
Resumen
“Posorja en acción S.A.” es una empresa dedicada a proveer servicios de internet a la población de la parroquia, así como también a dar soporte tecnológico a sus clientes. Sus servicios vinculan muchas actividades que implican que la seguridad de la información sea demasiado importante. Poseen los equipos necesarios, pero estos no tienen las debidas protecciones es decir que están expuestos a amenazas. La finalidad de este trabajo es proveer el diseño de la gestión de seguridad de la información que sirva como guía para los administradores del centro de cómputo de la empresa y así poder mitigar los riesgos existentes, también para crear controles que permitan evitarlos. Se realiza el diseño en base al estudio de la situación actual y a la selección de los controles pertinentes de la norma ISO 27002, se usará como metodología MAGERIT que utiliza como herramienta el software PILAR para el análisis y gestión de riesgo permitiendo identificar amenazas. Este diseño ayudara a que los miembros de la entidad sean conscientes sobre los riesgos a los que están expuestos para tomar en cuenta medidas preventivas que servirán para proteger los activos de la empresa con el fin de ser menos vulnerable ante posibles ataques y servirá como referencia para empresas que se dediquen a una actividad similar.
"Posorja in action Cia. Ltda." is a company dedicated to provide internet services to the population of the parish, as well as providing technological support to its clients. Its services link many activities that imply that information security is too important. They have the necessary equipment, but they do not have the proper protections, that is to say, they are exposed to threats. The purpose of this work is to provide the design of information security management that serves as a guide for the administrators of the company's computer center and thus to mitigate the existing risks, also to create controls to avoid them. The design is based on the study of the current situation and the selection of relevant controls of the ISO 27002 standard. MAGERIT methodology will be used along with PILAR software as a tool for risk analysis and management, allowing the identification of threats. This design will help members of the entity be aware of the risks they are exposed to take into account preventive measures that will protect the company's assets in order to be less vulnerable to possible attacks and will serve as a reference for companies engaged in a similar activity.
"Posorja in action Cia. Ltda." is a company dedicated to provide internet services to the population of the parish, as well as providing technological support to its clients. Its services link many activities that imply that information security is too important. They have the necessary equipment, but they do not have the proper protections, that is to say, they are exposed to threats. The purpose of this work is to provide the design of information security management that serves as a guide for the administrators of the company's computer center and thus to mitigate the existing risks, also to create controls to avoid them. The design is based on the study of the current situation and the selection of relevant controls of the ISO 27002 standard. MAGERIT methodology will be used along with PILAR software as a tool for risk analysis and management, allowing the identification of threats. This design will help members of the entity be aware of the risks they are exposed to take into account preventive measures that will protect the company's assets in order to be less vulnerable to possible attacks and will serve as a reference for companies engaged in a similar activity.
Descripción
ADOBE
Palabras clave
Gestión De La Seguridad, Diseño, ISO 27002, Seguridad, Información, Riesgo